Skip to main content

Three buffer overflow vulnerabilities could lead to code execution and three others concern path traversal, authentication bypass, and insecure randomness

Summary

Three buffer overflow vulnerabilities could lead to code execution and three others concern path traversal, authentication bypass, and insecure randomness

Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

SonicWall has released a security advisory to address six vulnerabilities in SMA100 SSL-VPN appliances. SonicWall Secure Mobile Access (SMA) is a unified secure access gateway that provides a Secure Sockets Layer (SSL) virtual private network (VPN), context aware device authorisation, application level VPN, and advanced authentication with federated single sign-on (SSO) for cloud and on-premises resources.

Vulnerability details

CVE-2024-38475 - attributed to publicly known Apache HTTP Server vulnerability

CVE-2024-40763 - affecting SonicWALL SMA100 SSLVPN

CVE-2024-45318 - affecting SonicWall SMA100 SSLVPN web management interface

CVE-2024-45319 - affecting SonicWall SMA100 SSLVPN

CVE-2024-53702 - affecting SonicWall SMA100 SSLVPN backup code generator

CVE-2024-53703 - affecting SonicWall SMA100 SSLVPN mod_httprp library loaded by the Apache web server

Remediation advice

Affected organisations are encouraged to review SonicWall advisory SNWLID-2024-0018 and apply the relevant updates.

Definitive source of threat updates

CVE Vulnerabilities

Last edited: 5 December 2024 3:41 pm